1 / 7

Technology Problem Space

Trusted Ring: A Security Enhancing Software Architecture Michael DiRossi, Inventor The Johns Hopkins University Applied Physics Laboratory. Technology Problem Space. Windows and Linux computers can not be trusted for high assurance applications because they are too complex to secure or verify

brasen
Télécharger la présentation

Technology Problem Space

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Trusted Ring: A Security Enhancing Software ArchitectureMichael DiRossi, InventorThe Johns Hopkins University Applied Physics Laboratory

  2. Technology Problem Space Windows and Linux computers can not be trusted for high assurance applications because they are too complex to secure or verify Monolithic kernel design Bug in mouse driver compromises entire system OS can not protect itself Users want to use these systems Can a high assurance computing environment be built with low assurance components?

  3. Technology – Trusted Ring Framework • Security enhancing software architecture that • is independent of OS • supports security service modules • provides a high assurance base from which to assert that desired security properties hold true • is based on hardware protection mechanisms

  4. Technology – Security Service Modules Security Services enhance the security of the operating system Operate in an execution domain that is independent of and isolated from the operating system Examples: Platform self-healing capability Protected encryption engine for online banking

  5. Technology Applications • Information Assurance • Security policy can be enforced despite compromises to the integrity of the operating system • General purpose high assurance computing platforms • Complimentary to virtualization technologies • Enhance security from within a VM • Enhance security of VMM

  6. Commercial Applications Any Intel IA-32 computer application with IA requirements Banking SCADA Government Electronic Voting Technology Readiness Proof-of-concept Trusted Ring Framework implementation for a Fedora Core 1 Linux operating system Basic self-healing security service implementation

  7. Contact Information • For technical information contact: Michael DiRossi, Inventor 443-778-1349 michael.dirossi@jhuapl.edu • For licensing information contact: Norma Lee Todd, Technology Manager Office of Technology Transfer The Johns Hopkins University Applied Physics Laboratory 11100 Johns Hopkins Road Laurel, MD 20723 443-778-4528 norma.todd@jhuapl.edu www.jhuapl.edu/ott

More Related